Forwarded from Art of Engineering (Mohsen)
Name: Shellcoder's Handbook
Requirements: C, C++, Assembly
Level: Basics to Intermediate
Authors: Chris Anley, John Heasman, Felix "FX" Lindner, Gerardo Richarte
Chapters:
1- Before You Begin
2- Stack Overflows
3- Shellcode
4- Introduction to Format String Bugs
5- Introduction to Heap Overflows
6- The Wild World of Windows
7- Windows Shellcode
8- Windows Overflows
9- Overcoming Filters
10- Introduction to Solaris Exploitation
11- Advanced Solaris Exploitation
12- OS X Shellcode
13- Cisco IOS Exploitation
14- Protection Mechanisms
15- Establishing a Working Environment
16- Fault Injection
17- The Art of Fuzzing
18- Source Code Auditing
19- Instrumented Investigation: A Manual Approach
20- Tracing for Vulnerabilities
21- Binary Auditing
22- Alternative Payload Strategies
23- Writing Exploits that Work in the Wild
24- Attacking Database Software
25- Unix Kernel Overflows
26- Exploiting Unix Kernel Vulnerabilities
27- Hacking the Windows Kernel
#binary #exploitation #book #resource
Requirements: C, C++, Assembly
Level: Basics to Intermediate
Authors: Chris Anley, John Heasman, Felix "FX" Lindner, Gerardo Richarte
Chapters:
1- Before You Begin
2- Stack Overflows
3- Shellcode
4- Introduction to Format String Bugs
5- Introduction to Heap Overflows
6- The Wild World of Windows
7- Windows Shellcode
8- Windows Overflows
9- Overcoming Filters
10- Introduction to Solaris Exploitation
11- Advanced Solaris Exploitation
12- OS X Shellcode
13- Cisco IOS Exploitation
14- Protection Mechanisms
15- Establishing a Working Environment
16- Fault Injection
17- The Art of Fuzzing
18- Source Code Auditing
19- Instrumented Investigation: A Manual Approach
20- Tracing for Vulnerabilities
21- Binary Auditing
22- Alternative Payload Strategies
23- Writing Exploits that Work in the Wild
24- Attacking Database Software
25- Unix Kernel Overflows
26- Exploiting Unix Kernel Vulnerabilities
27- Hacking the Windows Kernel
#binary #exploitation #book #resource
Forwarded from Art of Engineering (Mohsen)
Name: Portable Format Specification (ELF32)
Requirements: Compiling Steps, C Programming
Level: Intermediate
Author: Tools Interface Standards (TIS)
Chapters:
1- Object Files
1- Introduction
2- ELF Header
3- Sections
4- String Table
5- Symbol Table
6- Relocation
2- Program Loading and Dynamic Linking
1- Introduction
2- Program Header
3- Program Loading
4- Dynamic Linking
3- C Library
1- C Library
#elf #reverse_engineering #binary #paper #resource
Requirements: Compiling Steps, C Programming
Level: Intermediate
Author: Tools Interface Standards (TIS)
Chapters:
1- Object Files
1- Introduction
2- ELF Header
3- Sections
4- String Table
5- Symbol Table
6- Relocation
2- Program Loading and Dynamic Linking
1- Introduction
2- Program Header
3- Program Loading
4- Dynamic Linking
3- C Library
1- C Library
#elf #reverse_engineering #binary #paper #resource
Forwarded from Art of Engineering (Mohsen)
Name: Portable Format Specification (PE/EXE)
Requirements: Compiling Steps, C Programming
Level: Intermediate
Author: Tools Interface Standards (TIS)
Chapters:
1 - Overview
2 - PE Header
3 - Object Table
4 - Image Pages
5 - Exports
6 - Imports
7 - Thread Local Storage
8 - Resources
9 - Fixup Table
10 - Debug Information
#pe #exe #reverse_engineering #binary #paper #resource
Requirements: Compiling Steps, C Programming
Level: Intermediate
Author: Tools Interface Standards (TIS)
Chapters:
1 - Overview
2 - PE Header
3 - Object Table
4 - Image Pages
5 - Exports
6 - Imports
7 - Thread Local Storage
8 - Resources
9 - Fixup Table
10 - Debug Information
#pe #exe #reverse_engineering #binary #paper #resource
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Infosec Fortress
Zhang Yunhai - BYPASS CONTROL FLOW GUARD COMPREHENSIVELY - Blackhat
#binary
#exploitation
———
🆔 @Infosec_Fortress
#binary
#exploitation
———
🆔 @Infosec_Fortress
❤5👍3
Forwarded from Infosec Fortress
The Kernel Hacker's Guide to the Galaxy
Automating Exploit Engineering Workflows
H2HC 2024
#binary
#kernel
#exploitation
———
🆔 @Infosec_Fortress
Automating Exploit Engineering Workflows
H2HC 2024
#binary
#kernel
#exploitation
———
🆔 @Infosec_Fortress
👍3
Forwarded from Infosec Fortress
Connor McGarr’s Blog
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
Dealing with Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), and Kernel Control Flow Guard (kCFG).
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
🔗 Link
#binary
#exploitation
#windows
#hvci
———
🆔 @Infosec_Fortress
🔗 Link
#binary
#exploitation
#windows
#hvci
———
🆔 @Infosec_Fortress
👍3🤣1
Forwarded from Infosec Fortress
Qrious Secure
Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991
Introduction Hi, I am Trung (xikhud). Last month, I joined Qrious Secure team as a new member, and my first target was to find and reproduce the security bugs that @bienpnn used at the Pwn2Own Vancouver 2023 to escape the VirtualBox VM.
Since VirtualBox is…
Since VirtualBox is…
Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991
🔗 Link
#binary
#exploitation
#virtualbox
#pwn2own
#cve
#CVE_2023_21987
#CVE_2023_21991
———
🆔 @Infosec_Fortress
🔗 Link
#binary
#exploitation
#virtualbox
#pwn2own
#cve
#CVE_2023_21987
#CVE_2023_21991
———
🆔 @Infosec_Fortress